Skip to content

nathan237/TrustOS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

217 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

TrustOS

TrustOS

The OS you can actually read β€” in your language.

A bare-metal operating system written entirely in Rust β€” 278,000+ lines, zero C, zero binary blobs, zero secrets.

Built by one developer. Auditable by anyone. Learnable in English & French.

Build Rust Lines Architectures Version Tests Translated License Author

Watch the demo

TrustOS Desktop

Source Code for Developers | What's New | Download | Why TrustOS | Features | Quick Start | Changelog


🌍 Source Code Translation for Developers

New in v0.10.4 β€” TrustOS ships its entire source code in 4 developer-friendly versions, auto-generated from one canonical codebase.

Every .rs file in kernel/src/ (484 files, 278K+ lines) is automatically translated into 4 presets β€” each one compiles, each one is a valid representation of TrustOS:

Version What it does Who it's for
translated/original/ Exact copy of the real source Reference / diff baseline
translated/minimal/ All comments stripped, identifiers shortened to minimal names (buf β†’ b) Study pure code structure without noise
translated/educational-en/ Abbreviations expanded (buf β†’ buffer, ctx β†’ context, irq β†’ interrupt_request) + inline English annotations on every unsafe, static, impl, trait, enum, #![no_std]… Learn Rust & OS dev in English
translated/educational-fr/ Same expansions + French annotations on every Rust pattern Apprendre Rust & l'OS dev en franΓ§ais

How it works

A custom tokenizer-based Rust source translator (tools/source_translator.py, 1,500+ lines) parses every token, detects renameable identifiers vs. protected positions (keywords, .field access, asm!() blocks, FFI, external crate paths…), and applies preset-specific transformations while guaranteeing the output compiles.

# Generate all 4 versions in one command:
.\trustos.ps1 translate

# Or generate a single version:
.\trustos.ps1 translate -Only educational-en

# Direct Python usage:
python tools/source_translator.py --preset educational --lang fr -i kernel/src/ -o translated/educational-fr/

Every translated/*/ folder includes a mapping.json with thousands of identifier mappings β€” fully deterministic, reloadable, and diffable.

Why this matters: TrustOS is 278K+ lines of bare-metal Rust. The educational versions turn it into the largest annotated Rust OS learning resource that exists β€” in two languages.

πŸ†• What's New in v0.10.5

March 19, 2026 β€” Full Userland Integration & Conformance Audit

TrustOS now has a production-grade Ring 3 userland with 104 Linux-compatible syscalls, a tri-architecture syscall library, and an 85-check conformance audit proving completeness.

  • πŸ”§ 104 Linux-compatible syscalls β€” Full handle_full() dispatcher: file I/O (24), process/thread (30), memory (4), networking (14), signals (4), epoll (5), scheduling (3), time (3), sync (3), resources (3), random, plus 4 TrustOS-specific syscalls. Linux ABI-compatible numbering.
  • πŸ“¦ trustos-syscall crate β€” New userland syscall library with tri-architecture support: syscall (x86_64), svc #0 (aarch64), ecall (riscv64). 30+ high-level wrappers (write, read, fork, exec, mmap, brk, socket, pipe, signals, time...).
  • πŸ— CpuContext portability β€” Proper per-architecture register structs: x86_64 (RAX-R15, RIP, RFLAGS, CS, SS), aarch64 (x0-x30, SP, PC, SPSR), riscv64 (x0-x31, PC, SSTATUS). No more generic fallback.
  • πŸ§ͺ userland-audit command β€” 85-check static conformance audit across 22 categories + 9 live Ring 3 execution tests. Verifies every POSIX/Linux userland capability: Ring 3 execution, syscall interface, memory management, process lifecycle, file I/O, signals, IPC, networking, time, scheduling, ELF loading, address space isolation, exception handling, GDT/TSS, security, filesystem, threading, epoll, resource limits, random, multi-architecture.
  • πŸ”¬ usertest command β€” 9-test Ring 3 execution suite: basic exec, ELF load, brk/mmap, pipe IPC, signals, stdio, exception safety (UD2), frame leak detection, address space isolation.
  • πŸ¦€ Userland programs β€” init process rewritten with real Linux syscalls (getpid, brk, clock_gettime, sched_yield). New hello-rust Ring 3 program.
  • πŸ› Ring 3 architecture β€” SYSCALL/SYSRET via MSR (STAR/LSTAR/SFMASK/EFER), GDT user segments (CS=0x20, DS=0x18), TSS RSP0 per-CPU, per-process PML4 page tables, ELF PIE relocations, System V ABI stack (argc/argv/auxv), COW fork.
  • πŸ“ˆ 278,000+ lines across 484 source files, 3 architectures.

πŸ“₯ Download

Grab an ISO and boot it in 30 seconds:

Edition ISO Size What's Inside Download
TrustOS trustos.iso ~12 MB Full OS: desktop, networking, emulators, TrustLang, TrustLab, 200+ commands. ⬇ Download

For developers: The full source code is also available in 4 translated versions (original, minimal, educational-en, educational-fr) β€” clone the repo and explore translated/.

# Boot it right now in QEMU:
qemu-system-x86_64 -cdrom trustos.iso -m 512M -cpu max -smp 4 -display gtk -vga std -serial stdio

πŸ’Ύ Flash to USB with Rufus

TrustOS runs bare-metal on x86_64 PCs (UEFI or Legacy BIOS), ARM64 phones/tablets, and RISC-V boards. Flash the ISO to a USB drive and boot on real hardware:

πŸ”Ή UEFI Boot (modern PCs, 2012+)
  1. Download & open Rufus (no install needed)
  2. Device β†’ select your USB drive
  3. Boot selection β†’ click SELECT β†’ pick trustos.iso
  4. Rufus will ask: ISO mode or DD Image mode β†’ pick DD Image mode
  5. Click START β€” the partition scheme / target system fields stay greyed out in DD mode, that's normal
  6. Wait for the write to finish (~30 seconds)
  7. Reboot your PC β†’ press F12 / F2 / DEL at startup to open the boot menu
  8. Select your USB drive (it may appear as UEFI: <USB name>)
  9. TrustOS boots! πŸš€

⚠️ If your PC has Secure Boot enabled, you may need to disable it in BIOS settings first (Security β†’ Secure Boot β†’ Disabled). TrustOS does not use signed bootloaders.

πŸ”Ή Legacy BIOS Boot (older PCs, pre-2012 or CSM mode)
  1. Download & open Rufus (no install needed)
  2. Device β†’ select your USB drive
  3. Boot selection β†’ click SELECT β†’ pick trustos.iso
  4. Rufus will ask: ISO mode or DD Image mode β†’ pick DD Image mode
  5. Click START β€” the partition scheme / target system fields stay greyed out in DD mode, that's normal
  6. Wait for the write to finish (~30 seconds)
  7. Reboot your PC β†’ press F12 / F2 / DEL at startup to open the boot menu
  8. Select your USB drive (non-UEFI entry, usually just the drive name without UEFI: prefix)
  9. TrustOS boots via Legacy/CSM! πŸš€

πŸ’‘ On some PCs, you need to enable CSM (Compatibility Support Module) or Legacy Boot in BIOS settings for the Legacy option to appear.

πŸ”Ή Linux / macOS (dd)
# Replace /dev/sdX with your USB device (use lsblk to find it)
sudo dd if=trustos.iso of=/dev/sdX bs=4M status=progress conv=fsync

Why DD Image mode? TrustOS uses a hybrid ISO (Limine bootloader) that embeds both UEFI and Legacy BIOS boot sectors directly in the image. DD mode writes the raw image byte-for-byte, preserving both boot paths. ISO mode would reformat the drive and break the hybrid layout.

All releases: github.com/nathan237/TrustOS/releases


πŸ”‘ Why TrustOS?

TrustOS does things that no other operating system on Earth does. Here's why you should care:

⚑ A native x86_64 compiler running inside the OS

TrustLang compiles your programs to raw Intel machine code and executes them β€” all from within the kernel. No LLVM. No GCC. No external toolchain. Write code β†’ native binary β†’ execute. The entire compiler is 3,600 lines of Rust.

πŸ” 278,000 lines β€” and you can read every single one

No binary blobs. No proprietary drivers. No hidden telemetry. Every driver, every protocol, every pixel, every encryption algorithm is open Rust. One developer built it. Anyone can audit it.

🌍 Source code that teaches itself β€” in your language

Every file ships in 4 auto-generated versions: original, minimal (stripped), educational-en (annotated English), educational-fr (annotated French). A custom tokenizer-based translator expands abbreviations, adds inline explanations of every unsafe, trait, impl, and Rust pattern β€” turning 278K lines of kernel code into the largest annotated Rust OS learning resource in existence.

πŸ–₯ A real desktop OS, not a toy

144 FPS SIMD-accelerated desktop with 14+ apps, a browser with HTML/CSS/JS, Game Boy and NES emulators, 3D chess, a code editor, network security toolkit, and the most complete kernel introspection lab ever built into a bare-metal OS.

πŸ— Everything from scratch β€” zero dependencies

TLS 1.3, TCP/IP, DNS, DHCP, HTTP/HTTPS, FAT32, EXT4, NVMe, AHCI, VirtIO, VT-x/AMD-V hypervisor, Ed25519 signatures, audio synthesizer β€” all written in pure Rust. Not a single line of C. Not a single external crate.

πŸ“± Runs on 3 architectures from one codebase

x86_64 PCs, ARM64 (Android phones, Raspberry Pi), RISC-V β€” same source, same OS.

🌐 Self-replicating over the network

PXE boot a blank machine β†’ TrustOS installs itself, pushes the kernel over TFTP, and brings up identical instances on bare hardware β€” automatically.

"The only OS where you can trace every packet, every pixel, and every keystroke back to its source code β€” in your language."


πŸ† Feature Highlights

These are things no other bare-metal OS does:

1. Native x86_64 Compiler Running Inside the OS

TrustLang is a full programming language built into the kernel β€” with a lexer, parser, AST compiler, bytecode VM, and a native x86_64 machine code backend. You can write a program, compile it to raw Intel instructions, and execute it β€” all from within TrustOS, with zero external tools.

trustlang compile my_app.tl   β†’ Compiles to native x86_64 and executes
trustlang run my_app.tl       β†’ Bytecode VM execution
trustlang bench               β†’ Benchmark native vs VM (shows speedup)
trustlang test                β†’ 55+ automated test suite

3,612 lines. Lexer β†’ Parser β†’ AST β†’ Bytecode OR native x86_64. Dual execution backends.

2. Self-Replicating Over the Network

TrustOS can PXE boot new machines, push the kernel binary over TFTP, and bring up identical TrustOS instances on bare hardware β€” automatically. Plug in a blank PC, turn it on, and TrustOS deploys itself.

3. Real-Time Kernel Introspection (TrustLab)

A 7-panel interactive lab that lets you watch the kernel at work in real-time: hardware status, kernel trace bus, file system tree, hex editor, TrustLang editor with syntax highlighting, execution pipeline. No other bare-metal OS ships this.

4. Everything From Scratch

TLS 1.3, TCP/IP, DNS, DHCP, HTTP, HTML/CSS parser, JavaScript engine, FAT32, EXT4, NVMe, AHCI, VirtIO, Game Boy emulator, NES emulator, 3D renderer, audio synthesizer, Ed25519 signatures, chess AI β€” all written in Rust, from zero, with no external libraries.

5. Source Code Translation for Developers

Every .rs file auto-translated into 4 versions (original, minimal, educational-en, educational-fr) by a custom tokenizer-based translator. 484 files Γ— 4 presets = 1,936 compilable Rust files. Abbreviations expanded, inline annotations in English or French on every Rust pattern. The entire codebase becomes a learning tool. β†’ Learn more

6. Userland Conformance Audit

The userland-audit command runs an 85-check static audit across 22 categories (Ring 3 execution, syscalls, memory, processes, file I/O, signals, IPC, networking, time, scheduling, ELF loading, address space isolation, exception handling, GDT/TSS, security, filesystem, threading, epoll, resource limits, random, system info, multi-architecture) plus 9 live Ring 3 execution tests (write+exit, ELF load, brk+mmap, pipe IPC, signals, getpid+clock_gettime, exception safety, frame leak detection, address space isolation). Result: 81 PASS, 4 PARTIAL, 0 MISSING.


Features

COSMIC2 Desktop Environment

  • Multi-layer GPU compositor: 8 rendering layers, SSE2 SIMD blitting, 144 FPS
  • Taskbar, dock, start menu, window manager with 4px chrome borders
  • 14+ desktop apps: Terminal, Files, TrustCode, Calculator, Network, Snake, Chess 3D, TrustBrowser, TrustEdit 3D…
  • Touch & gesture input for mobile/tablet deployment

TrustLang β€” Built-in Programming Language

  • Rust-inspired syntax: fn, let, mut, if/else, while, for, return, struct
  • Full pipeline: Lexer β†’ Parser β†’ AST β†’ Compiler β†’ Bytecode VM + native x86_64 backend
  • 20 builtin functions: print, pixel, fill_rect, draw_circle, screen_w, sleep…
  • REPL, file execution, syntax checker, native benchmark
  • 3,612 lines, dual execution mode (interpreted + native)

Network Stack (all from scratch)

  • VirtIO-net driver, TCP/IP (ARP, DHCP, DNS, TCP, UDP, ICMP), IPv6 + ICMPv6
  • TLS 1.3 β€” full handshake, X.509 certificate parsing, all crypto from scratch
  • HTTP/HTTPS client + HTTP server (httpd start/stop/status)
  • Live-tested against real internet (google.com nmap + curl verified)

TrustScan β€” Network Security Toolkit

Port scanner, packet sniffer, banner grabber, host discovery, traceroute, vulnerability scanner.

TrustLab β€” Kernel Introspection

7-panel interactive workspace: Hardware Status, Kernel Trace, Command Guide, File System Tree, TrustLang Editor, Execution Pipeline, Hex Editor. Zero-cost 512-slot trace bus. Launch: trustlab

Emulators

  • Game Boy Color β€” Full CGB: LR35902 CPU, all 501 opcodes, scanline PPU, MBC1/3/5 + GameLab analysis dashboard
  • NES β€” MOS 6502 (151 official + 8 unofficial opcodes), 2C02 PPU, mappers 0-3

Hypervisor & Linux Compatibility

  • Intel VT-x and AMD-V dual-backend with EPT/NPT
  • 104 Linux-compatible syscalls, ELF64 loader, Ring 3 userland, PTY/TTY, job control

Ring 3 Userland

  • Full SYSCALL/SYSRET Ring 3 execution with per-process page tables
  • ELF64 loader with PIE relocations, System V ABI stack (argc/argv/auxv)
  • trustos-syscall crate: tri-architecture syscall library (x86_64/aarch64/riscv64)
  • userland-audit: 85-check conformance audit + 9 live Ring 3 tests
  • COW fork, signals, pipes, BSD sockets, epoll, futex from userspace

Security & Crypto

  • Ed25519 signatures (RFC 8032) β€” full public-key cryptography
  • TLS 1.3 β€” handshake, AEAD, X.509, all from scratch
  • Capability-based security model

Storage

  • TrustFS β€” native bare-metal filesystem with WAL journal, indirect blocks
  • FAT32 β€” read/write for USB/disk interoperability
  • EXT4 β€” read-only for Linux compatibility
  • RamFS, DevFS, ProcFS β€” in-memory filesystems
  • Persistence β€” raw AHCI sector storage for cross-reboot file survival

Multi-Architecture

Target Arch Method Status
PC (USB/ISO) x86_64 Limine UEFI + Legacy BIOS (hybrid) Production
Android ARM64 fastboot flash boot Ready
Raspberry Pi ARM64 SD card (kernel8.img) Ready
RISC-V boards RISC-V OpenSBI + U-Boot Ready
QEMU (all 3 archs) x86_64 / ARM64 / RISC-V Virtual machine Ready

πŸ“Š By the Numbers

278,000+ lines of pure Rust 96/96 self-tests passing (100%)
484 source files 144 FPS SIMD desktop
3 architectures (x86_64, ARM64, RISC-V) < 1 sec boot time
104 Linux-compatible syscalls 0 lines of C
207+ shell commands 0 binary blobs
4 translated source versions (EN/FR) 1,920+ auto-generated compilable files
85 userland conformance checks 9 live Ring 3 tests
14+ desktop applications 0 external dependencies

πŸš€ Quick Start

Option A: Download & run (30 seconds)

  1. Grab the ISO from Releases (or use the Download links above)
  2. Boot it:
qemu-system-x86_64 -cdrom trustos.iso -m 512M -cpu max -smp 4 -display gtk -vga std -serial stdio

Or flash to USB with Rufus (DD Image mode) / dd and boot on real hardware. Works on both UEFI and Legacy BIOS machines.

Option B: Build from source

git clone https://github.com/nathan237/TrustOS.git
cd TrustOS

# Build the OS
.\trustos.ps1 build

# Generate all 4 translated source versions
.\trustos.ps1 translate

# Full release (build + translate + tag + push)
.\.trustos.ps1 release -Tag v0.10.5

First commands

Command What it does
desktop Launch COSMIC2 desktop environment
trustlang demo Run TrustLang demo program
trustlang test Run 55+ native backend tests
trustlab Open kernel introspection lab
showcase Automated feature tour
neofetch System info
chess3d 3D chess vs AI
gameboy Game Boy Color emulator
selftest Run 96 automated self-tests
userland-audit Full userland conformance audit (85 checks + 9 live tests)
usertest Ring 3 execution test suite
help All 207+ commands

Explore the translated source

translated/
  original/          β†’ Exact source copy (reference)
  minimal/           β†’ Stripped identifiers, no comments
  educational-en/    β†’ Expanded names + English annotations
  educational-fr/    β†’ Expanded names + French annotations

Each folder contains the full 480+-file kernel β€” compilable, diffable, and annotated for learning.


πŸ“ Project Structure

TrustOS/
  kernel/                     # Core bare-metal kernel (278K+ lines)
    src/                      # 484 .rs files
      trustlang/              # TrustLang compiler + native x86_64 (3,612 lines)
      shell/                  # 215+ commands
      desktop.rs              # COSMIC2 desktop manager
      hwdiag/                 # Hardware diagnostics (23 subcommands)
      network/                # TCP/IP, TLS 1.3, DHCP, DNS
      browser/                # HTML/CSS/JS browser engine
      gameboy/                # Game Boy Color emulator
      nes/                    # NES emulator
      hypervisor/             # VT-x/SVM, EPT/NPT
      vfs/                    # TrustFS, FAT32, EXT4, procfs
      tls13/                  # TLS 1.3, crypto, X.509
      netscan/                # Network security toolkit
      drivers/                # AHCI, USB, VirtIO, NVMe, Apple
  translated/                 # Auto-generated source versions
    original/                 # Exact copy (reference)
    minimal/                  # Stripped identifiers, no comments
    educational-en/           # Expanded + English annotations
    educational-fr/           # Expanded + French annotations
  tools/
    source_translator.py      # Tokenizer-based Rust translator (1,500+ lines)
    translate-all.ps1         # Translation orchestrator
  trustos.ps1                 # Unified build shell (build/release/translate/clean/status)
  userland/                   # Userspace programs
  scripts/
    build/                    # Build scripts (limine, multiarch)
    launch/                   # VM launch scripts (QEMU, VBox)
    test/                     # Test automation
  docs/                       # Documentation, roadmaps, guides
  builds/
    trustos/                  # ISO output
  firmware/                   # UEFI firmware (OVMF)
  limine/                     # Bootloader binaries
  apple/                      # iOS security research
  sdk/                        # Cross-compilation SDK

πŸ“‹ Changelog

v0.10.5 β€” Full Userland Integration & Conformance Audit (March 19, 2026)

  • 104 Linux-compatible syscalls β€” handle_full() dispatcher covers file I/O (24), process/thread (30), memory (4), networking (14), signals (4), epoll (5), scheduling (3), time (3), sync (3), resources (3), random, plus 4 TrustOS-specific syscalls.
  • trustos-syscall crate β€” Tri-architecture syscall library: syscall (x86_64), svc #0 (aarch64), ecall (riscv64). 30+ wrappers: write, read, fork, exec, mmap, brk, socket, pipe, signals, time.
  • CpuContext portability β€” Per-architecture register structs for x86_64, aarch64, riscv64. No generic fallback.
  • userland-audit command β€” 85-check conformance audit (22 categories) + 9 live Ring 3 tests. Result: 81 PASS, 4 PARTIAL, 0 MISSING.
  • usertest command β€” 9-test Ring 3 suite: basic exec, ELF load, brk/mmap, pipe IPC, signals, stdio, exception safety, frame leak detection, address space isolation.
  • Init process rewrite β€” PID 1 now uses real Linux syscalls via trustos-syscall.
  • hello-rust program β€” New Ring 3 hello world in Rust.
  • 278,000+ lines across 484 source files.

v0.10.4 β€” Universal Hardware Debugger Expansion (March 18, 2026)

  • SMBIOS/DMI parser β€” Scans memory for SMBIOS 2.x/3.0 entry points. Identifies board, BIOS, chassis, CPU, DIMM slots (532 lines).
  • ATA SMART reader β€” IDE PIO + AHCI DMA SMART reads. 50+ attributes, threshold comparison, pre-failure detection (543 lines). New AHCI driver functions: send_smart_command(), smart_read_data().
  • HTML report generator β€” Self-contained HTML with embedded CSS dark theme. SMBIOS, CPU, DIMM table, PCI, SMART, thermals, EFI. USB FAT32 export (280 lines).
  • EFI/UEFI probe β€” Boot mode, Secure Boot, firmware vendor, UEFI version. Memory scan for EFI System Table post-ExitBootServices (249 lines).
  • EDID display parser β€” Intel GMBUS I2C EDID read. Monitor manufacturer, model, native resolution, physical size, modes (370 lines).
  • ACPI battery & thermal zones β€” EC battery (ThinkPad + generic), AC adapter, 8 thermal sensors, MSR temps, sleep states, EC hex dump (351 lines).
  • MARIONET probe integration β€” SystemData enriched with SMBIOS, SMART, EFI, battery, thermal zones.
  • Hypervisor safety β€” AMD SVM: all unwrap() removed. VT-x: error handling improvements.
  • HwDbg: 23 subcommands β€” up from 17. New: smbios, smart, efi, edid, battery, report.
  • +4,650 lines of new hardware diagnostic code.

v0.10.3 β€” Source Code Translation & ThinkPad Hardware (March 15, 2026)

  • Source Code Translation System β€” Custom tokenizer-based Rust translator (tools/source_translator.py, 1,500+ lines). Auto-generates 4 versions of the entire kernel source (480+ files): original, minimal, educational-en, educational-fr. Educational versions expand 120+ abbreviations and add inline annotations on every Rust pattern (unsafe, trait, impl, enum, #![no_std]…). All versions compile. Unified via .\trustos.ps1 translate.
  • ThinkPad EC driver β€” Embedded Controller communication (ports 0x62/0x66) with IBF/OBF handshake and timeout. 8 temperature sensors, fan level get/set (0-7, auto, full speed, off), fan RPM readout.
  • CPU frequency/voltage β€” Intel Enhanced SpeedStep via MSR 0x198/0x199. Read current freq/voltage, set P-states by FID/VID, predefined T61 Core 2 Duo profiles. CPU DTS thermal readout via MSR 0x19C.
  • HDA speaker path β€” Fixed critical bug where only the headphone route had conn_sel set. Speaker path NID 18β†’10β†’4 never received audio. All output paths now fully configured.
  • HDA GPIO1 polarity β€” T61 needs GPIO1=HIGH for amp power (not LOW like HP laptops). Confirmed via hardware testing.
  • HDA Amp Param Override β€” Per spec 7.3.4.7, use AFG amp caps when widget override bit is clear. AD1984 widgets returned non-zero caps with numsteps=0.
  • Shell scrollback β€” Backspace tracking, raw pixel suggestion rendering, auto-snap on restore. Tab autocomplete uses direct pixel clearing to avoid buffer corruption.
  • New commands: fan, temp/sensors, cpufreq/speedstep.

v0.10.1 β€” Desktop Apps & Shell Polish (March 14, 2026)

  • Settings GUI β€” Full settings panel in COSMIC2 desktop: 8 categories with sidebar navigation. Display (resolution info, animations toggle), Sound (volume slider), Taskbar (clock/date/centered icons toggles), Personalization, Accessibility (high contrast toggle), Network, Apps, About.
  • NetScan GUI β€” Network security toolkit as a tabbed desktop app: Dashboard overview, Port Scanner, Host Discovery, Packet Sniffer, Traceroute, Vulnerability Scanner. Keyboard-navigable tabs.
  • Shell scrollback fix β€” scroll_down() now redraws at offset=0 (was a no-op). redraw_from_scrollback renders the current uncommitted line at live view. Auto-snap to bottom on any non-PageUp/PageDown keypress. New restore_live_view() API.
  • Tab autocomplete cursor fix β€” clear_suggestions_at_row() left cursor on suggestion rows; Tab/Enter now restore cursor to input row before clearing.
  • ACPI shutdown hardening β€” Try QEMU (0x604), Bochs (0xB004), VirtualBox (0x4004), Cloud Hypervisor (0x600) shutdown ports before standard ACPI PM1a multi-type scan.
  • Desktop icon rename β€” "Chess 3D" replaces generic "Games".

v0.10.0 β€” Real Hardware Stability (March 13, 2026)

  • T61 desktop freeze fixed β€” serial::read_byte() now checks SERIAL_PRESENT; UART noise no longer spins the keyboard loop. Desktop input loop capped at 32 keys/frame.
  • HDA audio on ICH8 β€” Codec wake timeout 50ms with retry, AD198x/CX205xx quirks, EAPD, proper L+R amp unmute.
  • SIMD/FPU safety β€” fninit + ldmxcsr in enable_sse() masks all SIMD/FPU exceptions from dirty BIOS state. New IDT handlers for #NM(7), #SS(12), #MF(16), #XM(19).
  • Fallible buffer allocs β€” Double buffer, background cache, GL depth buffer use try_reserve_exact (no OOM panic).
  • Diagnostic framework β€” Step-by-step visual diagnostics written directly to raw framebuffer for hardware debugging.

v0.9.6 β€” T61 Desktop Crash Fix (March 13, 2026)

  • MXCSR/FPU init β€” Real hardware BIOS leaves dirty SIMD/FPU state; now clean-initialized.
  • Missing IDT handlers β€” Added #NM, #SS, #MF, #XM exception handlers.
  • Fallible framebuffer allocs β€” init_double_buffer / init_background_cache use try_reserve_exact.
  • Autocomplete bounds check β€” Shell autocomplete no longer panics on edge cases.

v0.9.5 β€” Hardware Compatibility Hardening (March 13, 2026)

  • Serial port detection β€” Loopback test + write timeout; no-UART systems boot without hangs.
  • APIC timer fallback β€” PIT calibration failure β†’ 1000 ticks/ms fallback; timer always starts.
  • 4K OOM protection β€” Backbuffer capped at 16 MB; 4K+ goes direct framebuffer.
  • BPP validation β€” Non-32bpp framebuffers warned and handled gracefully.

v0.9.4 β€” Keyboard Stability Fix (March 13, 2026)

  • Deadlock fix β€” Keyboard IRQ + shell input buffer lock race eliminated with without_interrupts + try_lock.
  • Bootstrap guard β€” Keyboard IRQ handlers gated behind BOOTSTRAP_READY (matches timer handler pattern).
  • i8042 timeout 10x β€” 100K β†’ 1M spin iterations for slow PS/2 controllers.
  • Pause/Break key β€” E1 prefix (6-byte sequence) properly consumed.
  • Right Ctrl/Alt release tracking β€” Extended modifier releases no longer silently dropped.
  • PS/2 response filter β€” Added 0xAB to spurious scancode filter.

v0.9.3 β€” Taskbar Fix & Framebuffer Cleanup (March 12, 2026)

  • Taskbar tray spacing β€” Fixed tray icon overlap.
  • Aura removed β€” Cleaned framebuffer effects.

v0.9.2 β€” Legacy BIOS Boot & Audio Viz (March 12, 2026)

  • Legacy BIOS boot support β€” Hybrid ISO now boots on PCs without UEFI. limine bios-install, Rock Ridge -R -r -J ISO flags, limine.conf + limine.cfg dual config.
  • Taskbar overlap fix β€” Desktop windows no longer render behind the taskbar.
  • Audio visualizer β€” Real-time waveform display in desktop.
  • TrustLang VM improvements β€” Better error handling, optimized execution.

v0.9.1 β€” Music Player Overhaul (March 12, 2026)

  • TrustPlayer β€” New music player with waveform visualizer, playlist, playback controls.
  • Auto-tier fix β€” Hardware tier detection corrected.

v0.9.0 β€” Boot Fix, Transparent Logo, Chrome Browser (March 12, 2026)

  • Fix boot ALLOC ERROR crash β€” CHECKPOINTS and BOOT_MEMORY_MAP replaced with fixed-size arrays (no heap before allocator init).
  • Fix build pipeline β€” xorriso stderr no longer kills PowerShell script.
  • Transparent logo β€” Logo renders over matrix rain (luminance threshold skip).
  • Chrome-style browser β€” Tab bar, omnibox, rounded buttons, lock icon, 3-dot menu.
  • File manager β€” Details/Tiles views, sidebar, search, column sorting.
  • 30 files changed, ~5500 insertions, ~570 deletions.

v0.8.0 β€” Native Compiler & Desktop Polish (March 12, 2026)

  • TrustLang native x86_64 backend β€” compile .tl programs directly to Intel machine code and execute in-kernel. Dual execution: bytecode VM + native. 55+ automated tests + cross-validation + benchmarking.
  • x86_64 assembler module (x86asm.rs) β€” full instruction emitter: MOV, ADD, SUB, IMUL, IDIV, CMP, Jcc, SETcc, CALL, RET, function prologue/epilogue.
  • Desktop border refinement β€” window borders thickened to 4px for a bolder, more modern look.
  • Shell commands: trustlang compile, trustlang test, trustlang bench.
  • Selftest integration β€” native compiler smoke test added to the 96-test diagnostic suite.

v0.7.0 β€” checkm8 & Multi-Edition (March 2026)

  • Project reorganization: root cleaned from 400+ files to 11.
  • On-device AI engine β€” 4.4M-parameter transformer architecture (work in progress).
  • checkm8 SecureROM exploit β€” bare-metal xHCI USB exploit for Apple A12 DFU mode.
  • Apple hardware drivers β€” AIC + UART for native Apple silicon.
  • ARM64 GICv2 β€” full interrupt controller + exception vectors.
  • COSMIC2 Desktop refresh β€” redesigned windows, transparency, icons.

v0.6.0 β€” Multi-Arch & Universal Boot (February 2026)

  • Multi-Architecture: x86_64, aarch64, riscv64 from one codebase.
  • Android boot: boot.img v2 pipeline, fastboot flash boot.
  • Raspberry Pi SD: bare-metal RPi 4/5.
  • Universal installer: 9 targets, one script.
  • Touch & gesture input.

v0.5.0 β€” CyberLab (February 2026)

  • Live network scan verified on google.com β€” 11/11 tests passed.
  • Code optimization (βˆ’2,800 lines).
  • 95/96 auto-tests (99%).

v0.4.x β€” Emulators & GameLab (February 2026)

  • Game Boy Color emulator β€” full CGB: LR35902, scanline PPU, MBC1/3/5.
  • GameLab β€” 2,000-line analysis dashboard.
  • NES emulator β€” 6502 CPU, 2C02 PPU, mappers 0-3.
  • Shell scripting, HTTP server, TrustPkg, TrustScan, IPv6.

v0.3.x β€” Foundation (February 2026)

  • ACPI, PIC, PIT, RTC, PTY/TTY, job control, NVMe swap, SMP.

v0.2.0 β€” Userspace (February 2026)

  • Ring 3 execution, ELF64 loader, TrustFS.

v0.1.x β€” Initial Development (February 2026)

  • TrustLab, COSMIC2 desktop, Ed25519, 3D Chess, audio synth, web sandbox.

πŸ“– Documentation

Document Location
Developer Guide docs/DEVELOPER_GUIDE.md
Contributing docs/CONTRIBUTING.md
Roadmap docs/ROADMAP_V2.md
Release Notes docs/RELEASE_NOTES.md
Command Reference docs/TRUSTOS_COMPLETE_COMMAND_REFERENCE.md
Source Translator tools/source_translator.py
Translated Source (EN) translated/educational-en/
Translated Source (FR) translated/educational-fr/

🀝 Contributing

Contributions welcome. TrustOS is designed to be readable and hackable.

See docs/CONTRIBUTING.md for the full guide.

git clone https://github.com/YOUR_USERNAME/TrustOS.git
git checkout -b feature/my-feature
cargo build --release -p trustos_kernel
# Test in QEMU, then open a Pull Request

πŸ€– AI Disclosure

This project is built using GitHub Copilot (Claude) in VS Code agent mode. The AI generates the majority of the code from my prompts and architectural decisions. I design, direct, debug on real hardware, and review the output. This is a solo learning/experimental project, not production software.


πŸ“„ License

Apache License 2.0 β€” see LICENSE.


πŸ‘€ Author

Nated0ge β€” Sole creator & developer of TrustOS


Trust the code. Rust is the reason.

Created by Nated0ge β€” March 2026

278,000+ lines | 104 syscalls | 3 architectures | 85-check userland audit | Everything from scratch | Zero C

Report Bug | Request Feature | Watch Demo

About

πŸ¦€ TrustOS β€” 264K lines of bare-metal Rust. Zero C, zero blobs. Desktop, native x86_64 compiler, browser, emulators, TLS 1.3, PXE self-replication. Source code ships in 4 educational versions (EN/FR). x86_64/ARM64/RISC-V. Built solo by @Nated0ge.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

 
 
 

Contributors